Chapter 18 Wireless Configuration
802.1X uses an existing protocol, the Extensible Authentication
Protocol (EAP, RFC 2284), that works on Ethernet, Token Ring, or
wireless LANs, for message exchange during the authentication
process.
In a wireless LAN with 802.1X, a user (known as the supplicant)
requests access to an access point (known as the authenticator).
The access point forces the user (actually, the client software of
the user) into an unauthorized state that allows the client to send
only an EAP start message. The access point returns an EAP mes-
sage requesting the identity of the user.
The client returns the
identity, which is then forwarded by the access point to the au-
thentication server, which uses an algorithm to authenticate the
user and then returns an accept or reject message back to the
access point. Assuming an accept was received, the access point
changes the client’s state to authorized and normal transmission
can take place.
The authentication server may use the Remote Authentication
Dial-In User Service (RADIUS), although 802.1x does not specify
it.
WPS
Wi-Fi Protected Setup (WPS), was introduced and developed by
the Wi-Fi Alliance (http://www.wi-fi.org/) to help standardize and
simplify ways of setting up and configuring security on a wireless
network.
Traditionally, users would have to manually create a wireless net-
work name (SSID), and manually enter a creative, yet predictable
security key on both the access point and the client, to prevent
unwanted access to their wireless network.
This entire process
requires the users to have the background knowledge of the
Wi-Fi devices and the ability to make the necessary configuration
changes.
WPS was introduced to relieve and remove all of the guess work of
securing a wireless network by typing a short PIN (numeric code)
or pushing a button (Push-Button Configuration, or PBC). On a new
wireless network, WPS automatically configures a wireless network
with a network name (SSID) and strong WPA data encryption and
authentication. WPS is designed to support various Wi-Fi certified
802.11 products ranging from access points, wireless adapters,
Wi-Fi phones, and other consumer electronics devices.
Advantages of WPS:
�
WPS automatically configures the network name (SSID) and
WPA security key for the access point and the WPS enabled
client devices on a network.
You do not need to know the
SSID and security keys or passphrases when connecting WPS-
enabled devices.
�
No one can guess or figure out your security keys or passphrase
because the keys are randomly generated. You need not enter
predictable passphrases or long sequences of hexadecimals.
Information and network credentials are securely exchanged
over the air using the EAP, one of the authentication protocols
used in WPA2.
�
WPS has been integrated and supported in Windows Vista.
Currently, Windows Vista only works in Registrar mode.
Disadvantages of WPS:
Confidential and Proprietary Information of ZTE CORPORATION
145